Juniper sa2000_4000_6000

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Datasheet

Juniper Networks Secure


Access 2000, 4000, and
6000 Appliances
Product Description
Juniper Networks Secure Access products lead The Juniper Networks SA 2000, SA 4000, and SA 6000 SSL VPN appliances meet the
needs of companies of all sizes. Secure Access appliances are based on the Instant
the SSL virtual private network (VPN) market Virtual Extranet (IVE) platform, which uses SSL, the security protocol found in all
standard Web browsers. The use of SSL eliminates the need for pre-installed client
with a complete range of remote access software deployment, changes to internal servers, and costly ongoing maintenance and
appliances, including the Secure Access 2000 desktop support. Juniper’s Secure Access appliances also offer sophisticated partner/
customer extranet features that enable controlled access to differentiated users and
(SA 2000), Secure Access 4000 (SA 4000), and groups with no infrastructure changes, no DMZ deployments, and no software agents.
Secure Access (SA 6000). Juniper Networks Architecture and Key Components
Secure Access appliances combine the security The Juniper Networks SA 2000 SSL VPN enables small- to medium-size businesses
(SMBs) to deploy cost-effective remote and extranet access, as well as intranet security.
of SSL with standards-based access controls,
Users can access the corporate network and applications from any machine over the
granular policy creation, and unparalleled Web. The SA 2000 offers High Availability (HA) with seamless user failover.

flexibility. The result provides ubiquitous The Juniper Networks SA 4000 SSL VPN enables mid-to-large size organizations to
provide cost effective remote employee and partner extranet access using only a
security for all enterprise tasks with options for Web browser. The SA 4000 appliances feature rich access privilege management
functionality that can be used to create secure customer/partner extranets. This
increasingly stringent levels of access control functionality also allows the enterprise to secure access to the corporate intranet, so
to protect the most sensitive applications and that different employee and visitor populations can utilize exactly the resources that
they need while adhering to enterprise security policies. Built-in compression for all
data. Juniper Networks Secure Access appliances traffic types speeds performance, and hardware-based SSL acceleration is available for
more demanding environments. The SA 4000 also offers High-Availability (HA) with
deliver lower total cost of ownership over
seamless user failover.
traditional IPSec client solutions and unique The Juniper Networks SA 6000 SSL VPN is purpose-built for large enterprises and
end-to-end security features. service providers. It features best-in-class performance, scalability, and redundancy
for organizations with high volume secure access and authorization requirements.
Additionally, the SA 6000 offers High Availability (HA) with seamless user failover. The
SA 6000 hardware platform, complete with multi-unit clustering options, is designed
to scale to the largest enterprise deployments, with available redundant hot swappable
hard disks, power supplies, and fans, as well as GBIC-based multiple Ethernet ports for
redundant or meshed configurations. The SA 6000 also features a built-in compression
for web and files, and a state-of-the-art SSL acceleration chipset to speed CPU-intensive
encrypt/decrypt processes.
2

Features and Benefits


High-scalability Support on Secure Access 6000 SSL VPN
The SA 6000 is designed to meet the growing needs of large enterprises and service providers with its ability to support thousands of users
accessing the network remotely. The following shows the number of concurrent users that can be supported on the SA 6000 platform:
• Single SA 6000: Supports up to 5,000 concurrent users
• Two-unit cluster of SA 6000s: Supports up to 8,000 concurrent users
• Three-unit cluster of SA 6000s: Supports up to 12,000 concurrent users
• Four-unit cluster of SA 6000s: Supports up to 15,000 concurrent users
All performance testing is done based on real-world scenarios with simulation of traffic based on observed customer networks. In the case
of Core Access, this means real web applications are being accessed, which entails rigorous HTML rewriting and policy evaluation.

End-to-End Layered Security


The SA 2000, SA 4000, and SA 6000 provide complete end-to-end layered security, including endpoint client, device, data, and server
layered security controls.
These include:
Feature Feature Description Benefit
Host Checker Client computers can be checked both prior to and during Verifies/ensures that endpoint device meets corporate
a session to verify an acceptable device security posture security policy requirements before granting access,
requiring installed/running endpoint security applications remediating devices and quarantining users when necessary
(antivirus, firewall, etc.) also supports custom built checks
including verifying ports opened/closed, checking files/
processes and validating their authenticity with Message
Digest 5 (MD5) hash checksums, verifying registry settings,
machine certificates, and more
Host Checker Application Created in partnership with best-in-class endpoint security Utilize current security policies with remote users and
Programming Interface (API) vendors. Enables enterprises to enforce an endpoint trust devices; easier management
policy for managed PCs that have personal firewall, antivirus
clients, or other installed security clients, and quarantine
non-compliant devices
Trusted Network Connect (TNC) Allows interoperability with diverse endpoint security Enables customers to leverage existing investments
Support on Host Checker solutions from antivirus to patch management to endpoint security solutions from third-party vendors
compliance management solutions
Policy-based Enforcement Allows the enterprise to establish trustworthiness of non-API Enables access to extranet endpoint devices like PCs from
compliant hosts without writing custom API implementations partners that may run different security clients than that of
or locking out external users, such as customers or partners the enterprise
that run other security clients
Hardened security appliance and Hardened security infrastructure extensively audited by third- Not designed to run any additional services and is thus less
Web server party security experts including CyberTrust, iSec Partners, susceptible to attacks; no backdoors to exploit or hack
and has also received Common Criteria Certification
Security Services Employ Kernel- Undesirable traffic is dropped before it is processed by the Ensures that unauthenticated connection attempts, such as
level Packet Filtering and Safe TCP stack malformed packets or denial of service (DOS) attacks, are
Routing filtered out
Secure Virtual Workspace A secure and separate environment for remote sessions Ensures that all corporate data is securely deleted from a
(Advanced Feature Set) that encrypts all data and controls I/O access (printers, kiosk or other unmanaged endpoint after a session
drives, etc.)
Cache Cleaner All proxy downloads and temp files installed during the Ensures that no potentially sensitive session data is left
session are erased at logout behind on the endpoint machine
Data Trap and Cache Controls Rendering of content in non-cacheable format Prevents sensitive metadata (cookies, headers, form
entries, etc.) from leaving the network
Integrated Malware Protection Pre-installed checks to protect users & devices from Enables customers to provision endpoint containment
keyloggers, trojans, and remote control applications capabilities
Coordinated Threat Control Enables Juniper’s SA SSL VPN and Intrusion Detection and Effectively identify, stop, and remediate both network and
Prevention (IDP) appliances to tie the session identity of the application-level threats within remote access traffic
SSL VPN with the threat detection capabilities of IDP, taking
automatic action on users launching attacks
3

Lower Total Cost of Ownership


In addition to enterprise-class security benefits, the SA 2000, SA 4000, and SA 6000 have a wealth of features that enable low total cost
of ownership.
Feature Feature Description Benefit
Uses SSL Secure connection between remote user and internal Secure remote access with no client software deployment,
resource is via a Web connection at the application layer maintenance, and no changes to existing servers; no firewall
proxy and network address translation (NAT) traversal issues
Based On Industry-standard No installation or deployment of proprietary protocols The investment in the SA appliance can be leveraged across
Protocols and Security Methods required many applications and resources over time
Extensive Directory Integration and Existing directories in customer networks can be leveraged Existing directory investments can be leveraged with no
Broad Interoperability for authentication and authorization enabling granular infrastructure changes; no API’s for directory integration as
secure access without recreating those policies it’s all native/built in
Integration with Strong Ability to support SecurID, SAML, PKI/digital certificates Leverages existing corporate authentication methods to
Authentication and Identity and simplify administration
Access Management Platforms

Multiple Hostname Support Ability to host different virtual extranet Web sites from a Saves the cost of incremental servers, eases management
(Advanced Software Feature Set) single SA appliance overhead, and provides a transparent user experience with
differentiated entry URLs
Customizable User Interface Creation of completely customized sign-on pages Provides an individualized look for specified roles,
(Advanced Software Feature Set) streamlining the user experience

Juniper Networks Central Manager Intuitive Web-based UI for configuring, updating, and Conveniently manage, configure, and maintain SA appliances
(Advanced Software Feature Set) monitoring SA appliances within a single device/cluster or from one central location
across a global cluster deployment
“In Case of Emergency” (ICE) Provides licenses for a large number of additional users on Enables a company to continue business operations by
a SA SSL VPN appliance for a limited time when a disaster maintaining productivity, sustaining partnerships, and
or epidemic occurs delivering continued services to customers when the
unexpected happens
Cross-platform Support Ability for any platform to gain access to resources Provides flexibility in allowing users to access corporate
(e.g., Windows, Mac, Linux, mobile devices) resources from any type of device using any type of
operating system

Rich Access Privilege Management Capabilities


The SA 2000, SA 4000, and SA 6000 provide dynamic access privilege management capabilities without infrastructure changes, custom
development, or software deployment/maintenance. This facilitates the easy deployment and maintenance of secure remote access, as
well as secure extranets and intranets. When a user logs in to the SA appliance, they pass through a pre-authentication assessment, and
are then dynamically mapped to the session role that combines established network, device, identity, and session policy settings. Granular
resource authorization policies further ensure exact compliance to security strictures.
Feature Feature Description Benefit
Hybrid Role-/Resource-based Policy Administrators can tailor access Ensures that security policies reflect changing business
Model requirements
Pre-authentication Assessment Network and device attributes, including presence of Host Results used in dynamic policy enforcement decisions
Checker/Cache Cleaner, results of endpoint security scans,
source IP, browser type, and digital certificates, can be
examined before login is allowed
Dynamic Authentication Policy Enables administrators to establish a dynamic Leverages the enterprise’s existing investment in directories,
authentication policy for each unique session PKI, and strong authentication
Dynamic Role Mapping Combines network, device, and session attributes to Enables the administrator to provision by purpose for each
determine which of three different types of access is unique session
allowed
Resource Authorization Extremely granular access control to the URL, server, or Allows administrators to tailor security policies to specific
file level groups, providing access only to essential data
Granular Auditing and Logging Can be configured to the per-user, per-resource, per-event Fine-grained auditing and logging capabilities in a clear, easy
level for security purposes as well as capacity planning to understand format
Custom Expressions Enables the dynamic combination of attributes on a “per- Finer granularity and customization of policy roles
(Advanced Software Feature Set) session” basis, at the role definition/mapping rules and the
resource authorization policy level
4

User Self-Service
The SA 2000, SA 4000, and SA 6000 offer comprehensive password management features. These features increase end user productivity,
greatly simplify administration of large diverse user resources, and significantly reduce the number of help desk calls.
Feature Feature Description Benefit
Password Management Integration Standards-based interface for extensive integration with Leverage existing servers to authenticate users; users can
password policies in directory stores (LDAP, Microsoft Active manage their passwords directly through the SA interface
Directory, NT, etc.)
Web-based Single Sign-On (SSO) Allows users to access other applications or resources Alleviates the need for end users to enter and maintain
Basic Authentication and NTLM that are protected by another access management system multiple sets of credentials for Web-based and Microsoft
without re-entering login credentials applications
Web-based SSO Ability to pass user name, credentials, and other customer- Enhances user productivity and provides a customized
Forms-based, Header defined attributes to the authentication forms of other experience
Variable-based, SAML-based products and as header variables
(Advanced Feature Set)

Provision by Purpose
The SA 2000, SA 4000 and SA 6000 include three different access methods. These different methods are selected as part of the user’s role,
so the administrator can enable the appropriate access on a per-session basis, taking into account user, device, and network attributes in
combination with enterprise security policies.
Feature Feature Description Benefit
Clientless Core Web Access Access to Web-based applications, including complex Provides the most easily accessible form of application
JavaScript, XML, or Flash-based apps and Java applets that and resource access from a variety of end-user machines,
require a socket connection, as well as standards-based including handheld devices, and enables extremely granular
e-mail, Windows and UNIX file share, telnet/SSH hosted- security control options. Completely clientless approach
applications, Citrix and Windows Terminal Services, Terminal using only a web browser
Emulation, etc.
Secure Application Manager (SAM) A lightweight Java or Windows-based download enabling Enables access to client/server applications using just a
(SAMNC License) access to client/server applications web browser; also provides native access to terminal server
applications without the need for a pre-installed client
Network Connect (NC) Provides complete network-layer connectivity via an Users need only a Web browser; Network Connect
(SAMNC License) automatically provisioned cross-platform download; Windows transparently selects between two possible transport
Logon/GINA integration for domain single sign-on (SSO); methods, to automatically deliver the highest performance
installer services to mitigate need for admin rights possible for every network environment; when used with
Juniper Installer Services, no admin rights needed to install,
run, and upgrade Network Connect; optional stand-alone
installation available as well

Product Options Secure Application Manager and Network Connect Upgrade


The SA 2000, SA 4000, and SA 6000 have several hardware and Option
software options that can be added to the products. The SAM and NC upgrade is a companion to Juniper Networks Core
Clientless access for SSL VPNs. SAM and NC provide cross-platform
Advanced Endpoint Defense: Integrated Malware support for client/server applications using SAM, as well as full
Protection Option network-layer access using the adaptive dual transport methods
Advanced Endpoint Defense: Malware Protection is an endpoint found in NC. The combination of SAM and NC with Core Clientless
security software module that integrates with Host Checker and access will provide secure access to virtually any audience, from
provides protection from unwanted malware, such as Trojan horses remote/mobile workers to partners or customers, using a wide
and key loggers residing on an endpoint from which an end user range of devices from any network. Although SAM and NC deliver
is looking to start a remote access session. The malware module is two different access methods, administrators can specify exactly
configured as a Host Checker module and is dynamically delivered which access method, or combination of access methods, they
to the end-user’s PC, with no software to pre-install. All Secure wish to assign for each user in every deployment scenario. This
Access appliances include a license for 25 concurrent users, free allows administrators to provision by purpose, balancing security
of charge. Customers must purchase additional licenses in order to concerns with access requirements. Dynamic access controls
increase this functionality to support more users. enable the access to change as user, endpoint, and network criteria
change.
The Advanced Endpoint Defense: Integrated Malware Protection
upgrade is available for the SA 2000, SA 4000, and SA 6000. The SAMNC upgrade is available for the SA 2000, SA 4000,
and SA 6000.
5

Advanced Feature Set authentication infrastructure and policies. Juniper’s market-leading,


The Secure Access appliances are offered with either Baseline or hardened, and Common Criteria certified SSL VPN appliance
Advanced feature sets, designed to create an affordable solution architecture and SSL/HTTPS transport security for all traffic means
that meets the needs of every company, from SMB employee that administrators can rest assured that their Web conferencing
remote access deployments to the largest global enterprise and remote control solution adheres to the highest levels of
extranet. The Baseline features that come with the appliance enterprise security requirements.
provide the functionality that an enterprise would need to deploy The Secure Meeting upgrade is available for the SA 2000, SA 4000,
secure remote access, as well as a provision a basic customer/ and SA 6000.
partner extranet or intranet. The Advanced feature set provides
additional sophisticated capabilities that will meet the needs of Instant Virtual System Option
more complex deployments with diverse audiences and use cases, Juniper Networks Instant Virtual System (IVS) option is designed
including Secure Access Central Manager, a robust product with an to enable administrators to provision 255 logically independent
intuitive Web-based UI designed to facilitate the task of configuring, SSL VPN gateways within a single appliance/cluster. This enables
updating, and monitoring a single Secure Access appliance or service providers to offer network-based SSL VPN managed
a single cluster deployment. Both feature sets provide remote services to multiple customers from a single device or cluster,
access, extranet, and intranet capabilities with little to no need for as well as enabling enterprises to completely segment SSL VPN
client software, server changes, DMZ build-outs, or software agent traffic between multiple groups. IVS enables complete customer
deployments. The Advanced feature set includes: separation and provides segregation of traffic between multiple
• Advanced PKI support including ability to import multiple root customers using granular role based VLAN (802.1Q) tagging. This
and intermediate CAs, OCSP, and multiple server certificates enables the secure segregation of end users’ traffic, even if two
• User self service customers have overlapping IP addresses and enables provisioning
of specific VLANs for different user constituencies, such as remote
• Access Management Integration
employees and partners of customers. DNS/WINS, AAA, log/
• Multiple hostname support accounting servers and application servers such as Web mail, file
• Customizable UI shares, etc. can reside either in the respective customers’ intranets
• Combine attributes using Boolean expressions, for flexible, or in the service provider network. Service providers can provision
dynamic, “per-session” policies an overall concurrent number of users on a per customer basis with
• Advanced role definition and role mapping rules combine the flexibility to distribute further amongst different user audiences
attributes using Boolean expressions such as remote employees, contractors, partners, etc.
• Advanced resource authorization policies combine attributes The IVS upgrade is available for the SA 4000 and SA 6000.
using Boolean expressions
• Role-based delegation, configurable at the individual task level High Availability Option
• Flexible role definition Juniper Networks has designed a variety of HA clustering options
to support the Secure Access appliances, ensuring redundancy
• Juniper Networks Central Manager
and seamless failover in the rare case of a system failure. These
• Secure Virtual Workspace clustering options also provide performance scalability to handle
The Advanced Feature upgrade is available for the SA 2000, the most demanding usage scenarios. The Secure Access 2000
SA 4000, and SA 6000. and 4000 can be purchased in Cluster Pairs and the Secure Access
6000 can be purchased in a Multi-Unit Clusters or Cluster Pairs,
Secure Meeting Option to provide complete redundancy and expansive user scalability.
The Secure Meeting upgrade license extends the capabilities Both Multi-Unit Clusters and Cluster Pairs feature stateful peering
of the Juniper Networks Secure Access appliances by providing and failover across the LAN and WAN, so in the unlikely event
secure anytime, anywhere, cost effective online Web conferencing that one unit fails, system configurations (including authentication
and remote control PC access. Secure Meeting enables real-time server, authorization groups, bookmarks, etc.), user profile settings
application sharing so authorized employees and partners can (including user-defined bookmarks, cookies, etc.), and user sessions
easily schedule online meetings or activate instant meetings are preserved. Failover is seamless, so there is no interruption to
through an intuitive Web interface that requires no training user/enterprise productivity, no need for users to log in again, and
or special deployments. Help desk staff or customer service no downtime. Multi-Unit Clusters are automatically deployed in
representatives can provide remote assistance to any user or Active/Active mode, while Cluster Pairs can be configured in either
customer by remotely controlling their PC without requiring Active/Active or Active/Passive Mode.
the user to install any software. Best-in-class authentication, The HA option is available for the SA 2000, SA 4000, and SA 6000.
authorization, and accounting (AAA) capabilities enable companies
to easily integrate Secure Meeting with their existing internal
6

ICE Option • Sustain partnerships with around the clock real-time access to
applications and services while knowing resources are secured
SSL VPNs can help to keep organizations and businesses
and protected
functioning by connecting people even during the most
unpredictable circumstances – hurricanes, terrorist attacks, • Continue to deliver exceptional service to customers and partners
with online collaboration
transportation strikes, pandemics or virus outbreaks, the result of
which could mean the quarantine or isolation of entire regions or • Meet federal and government mandates for contingencies and
groups of people for an extended period of time. With the right continuity of operations (COOP) compliance
balance of risk and cost, the new Juniper Networks Secure Access • Balance risk and scalability with cost and ease of deployment
ICE offering delivers a timely solution for addressing a dramatic The ICE license is available for the SA4000 and the SA6000 and
peak in demand for remote access to ensure business continuity includes all of the following features:
whenever a disastrous event strikes. ICE provides licenses for a
large number of additional users on a Secure Access SSL VPN • Baseline
appliance for a limited time. With ICE, businesses can: • Advanced
• Maintain productivity by enabling ubiquitous access to • Secure Application Manager and Network Connect
applications and information for employees from anywhere, • Secure Meeting
anytime, and any device • SSL Acceleration

Specifications
SA 2000 SA 4000 SA 6000

Dimensions and Power


Dimensions 16.7 x 1.7 x 15 in 16.7 x 1.7 x 15 in 16.7 x 3.5 x 16.2 in
(W x H x D) (42.4 x 4.4 x 38.1 cm) (42.4 x 4.4 x 38.1 cm) (42.4 x 8.9 x 41.2 cm)
Weight 13.2 lb (5.99 kg) typical (unboxed) 13.6 lb (6.17 kg) typical (unboxed) 28.5 lb (12.94 kg) typical (unboxed)
Rack Mountable Yes, 19” Yes, 19” Yes, 19”
A/C Power Supply 100-240 VAC, 50-60 Hz, 2.5 A 100-240 VAC, 50-60 Hz, 2.5 A 100-240 VAC, 50-60 Hz, 2.5 A
Max, 260 Watts Max, 260 Watts Max, 500 Watts
System Battery CR2032 3 V lithium coin cell CR2032 3 V lithium coin cell CR2032 3 V lithium coin cell
Efficiency 65% minimum, at full load 65% minimum, at full load 65% minimum, at full load
MTBF 87,000 hours 70,000 hours 78,000 hours
Material 18 gauge (.048”) cold-rolled steel 18 gauge (.048”) cold-rolled steel 18 gauge (.048”) cold-rolled steel
Fans 1 blower, 1-40 mm ball 3-40 mm ball bearing fans, 2 externally accessible, hot
bearing fan in power supply 1-40 mm ball bearing fan in power supply swappable ball-bearing fans

Panel Display
Front Panel Power Button Yes Yes Yes
Power LED, HD Activity, Temp Yes Yes Yes
PS Fail No No Yes
HDD Activity and RAID Status LEDs No No Yes

Ports
Traffic Two RJ-45 Ethernet – Two RJ-45 Ethernet – Two RJ-45 Ethernet –
10/100/1000 full or half-duplex 10/100/1000 full or half-duplex 10/100/1000 full or half-duplex
(auto-negotiation) (auto-negotiation) (auto-negotiation)
Two SFP ports – Gig-E
Management N/A N/A One RJ-45 Ethernet-10/100/1000 full
or half-duplex (auto-negotiation)
Fast Ethernet IEEE 802.3u compliant IEEE 802.3u compliant IEEE 802.3u compliant
Gigabit Ethernet IEEE 802.3z or IEEE 802.3ab compliant IEEE 802.3z or IEEE 802.3ab compliant IEEE 802.3z or IEEE 802.3ab compliant
Console One 9-pin serial console port One 9-pin serial console port One 9-pin serial console port

Environment
Operating Temperature 50° to 95° F (10° to 35° C) 50° to 95° F (10° to 35° C) 50° to 104° F (10° to 40° C)
Storage Temperature -40° to 158° F (-40° to 70° C) -40° to 158° F (-40° to 70° C) -40° to 158° F (-40° to 70° C)
Relative Humidity (Operating) 8% to 90% noncondensing 8% to 90% noncondensing 8% to 90% noncondensing
Relative Humidity (Storage) 5% to 95% noncondensing 5% to 95% noncondensing 5% to 95% noncondensing
Altitude (Operating) -50 to 10,000 ft (3,000 m) -50 to 10,000 ft (3,000 m) -50 to 10,000 ft (3,000 m)
Altitude (Storage) -50 to 35,000 ft (10,600 m) -50 to 35,000 ft (10,600 m) -50 to 35,000 ft (10,600 m)
7

Specifications
SA 2000 SA 4000 SA 6000

Certifications
Safety Certifications EN60950-1:2001+ A11, EN60950-1:2001+ A11, EN60950-1:2001+ A11,
UL60950-1:2003, CSA C22.2 No. 60950-1, UL60950-1:2003, CSA C22.2 No. 60950-1, UL60950-1:2003, CSA C22.2 No. 60950-1,
IEC 60950-1:2001 IEC 60950-1:2001 IEC 60950-1:2001
Emissions Certifications FCC Class A, VCCI Class A, CE class A FCC Class A, VCCI Class A, CE class A FCC Class A, VCCI Class A, CE class A
Common Criteria EAL2 Certification Yes Yes Yes
FIPS Option (140-2, Level 3 Certification) No Yes Yes
Warranty 90 days; 90 days; 90 days;
Can be extended with support contract Can be extended with support contract Can be extended with support contract

Ordering Information
Secure Access 2000 Base System Secure Access 4000 Feature Licenses (cont’d)
SA2000 Secure Access 2000 Base System SA-AED-ADD-250U Advanced Endpoint Defense: Malware Protection
- Add 250 simultaneous users
Secure Access 2000 User Licenses SA-AED-ADD-500U Advanced Endpoint Defense: Malware Protection
SA2000-ADD-25U Add 25 simultaneous users to SA 2000 - Add 500 simultaneous users
SA2000-ADD-50U Add 50 simultaneous users to SA 2000 Secure Access 4000 Clustering Licenses
SA2000-ADD-100U Add 100 simultaneous users to SA 2000
SA4000-CL-50U Clustering: Allow 50 additional users to be shared from
Secure Access 2000 Feature Licenses another SA 4000
SA4000-CL-100U Clustering: Allow 100 additional users to be shared from
SA2000-SAMNC Secure Application Manager and Network Connect for SA 2000 another SA 4000
SA2000-ADV Advanced for SA 2000 SA4000-CL-250U Clustering: Allow 250 additional users to be shared from
SA2000-MTG Secure Meeting for SA 2000 another SA 4000
SA-AED-ADD-50U Advanced Endpoint Defense: Malware Protection SA4000-CL-500U Clustering: Allow 500 additional users to be shared from
- Add 50 simultaneous users another SA 4000
SA-AED-ADD-100U Advanced Endpoint Defense: Malware Protection SA4000-CL-1000U Clustering: Allow 1000 additional users to be shared from
- Add 100 simultaneous users another SA 4000

Secure Access 2000 Clustering Licenses Secure Access 6000 Base System
SA2000-CL-25U Clustering: Allow 25 additional users to be shared from SA6000 Secure Access 6000 Base System
another SA 2000
SA2000-CL-50U Clustering: Allow 50 additional users to be shared from Secure Access 6000 User Licenses
another SA 2000 SA6000-ADD-100U Add 100 simultaneous users to SA 6000
SA2000-CL-100U Clustering: Allow 100 additional users to be shared from SA6000-ADD-250U Add 250 simultaneous users to SA 6000
another SA 2000
SA6000-ADD-500U Add 500 simultaneous users to SA 6000
Secure Access 4000 Base System SA6000-ADD-1000U Add 1000 simultaneous users to SA 6000
SA6000-ADD-2500U Add 2500 simultaneous users to SA 6000
SA4000 Secure Access 4000 Base System
SA6000-ADD-5000U Add 5000 simultaneous users to SA 6000
Secure Access 4000 User Licenses SA6000-ADD-7500U* Add 7500 simultaneous users to SA 6000
SA4000-ADD-50U Add 50 simultaneous users to SA 4000 SA6000-ADD-10000U* Add 10000 simultaneous users to SA 6000
SA4000-ADD-100U Add 100 simultaneous users to SA 4000 SA6000-ADD-12500U* Add 12500 simultaneous users to SA 6000
SA4000-ADD-250U Add 250 simultaneous users to SA 4000 SA6000-ADD-15000U* Add 15000 simultaneous users to SA 6000
SA4000-ADD-500U Add 500 simultaneous users to SA 4000 *Multiple SA 6000s required
SA4000-ADD-1000U Add 1000 simultaneous users to SA 4000 Secure Access 6000 Feature Licenses
Secure Access 4000 Feature Licenses SA6000-SAMNC Secure Application Manager and Network Connect for SA 6000
SA4000-SAMNC Secure Application Manager and Network Connect for SA 4000 SA6000-ADV Advanced for SA 6000
SA4000-ADV Advanced for SA 4000 SA6000-MTG Secure Meeting for SA 6000
SA4000-MTG Secure Meeting for SA 4000 SA6000-IVS Instant Virtual System for SA 6000
SA4000-SSL SSL Acceleration License for SA 4000 SA-AED-ADD-50U Advanced Endpoint Defense: Malware Protection
SA4000-IVS Instant Virtual System for SA 4000 - Add 50 simultaneous users
SA-AED-ADD-50U Advanced Endpoint Defense: Malware Protection SA-AED-ADD-100U Advanced Endpoint Defense: Malware Protection
- Add 50 simultaneous users - Add 100 simultaneous users
SA-AED-ADD-100U Advanced Endpoint Defense: Malware Protection SA-AED-ADD-250U Advanced Endpoint Defense: Malware Protection
- Add 100 simultaneous users - Add 250 simultaneous users
Ordering Information (cont’d)
Secure Access 6000 Feature Licenses (cont’d) Accessories
SA-AED-ADD-500U Advanced Endpoint Defense: Malware Protection SA6000-PS Field Upgradeable Secondary Power Supply for SA 6000
- Add 500 simultaneous users SA6000-HD Field Upgradeable Secondary Hard Disk for SA 6000
SA-AED-ADD-1000U Advanced Endpoint Defense: Malware Protection SA6000-MEM Field Upgradeable (by authorized VAR only)
- Add 1000 simultaneous users Additional 2 GB Memory for SA 6000
SA-AED-ADD-2500U Advanced Endpoint Defense: Malware Protection SA6000-FAN Field Replaceable Fan for SA 6000
- Add 2500 simultaneous users
SA-ACC-RCKMT-KIT-1U Spare Secure Access Rack Mount Kit-1U
Secure Access 6000 Clustering Licenses SA-ACC-RCKMT-KIT-2U Spare Secure Access Rack Mount Kit-2U
SA-ACC-PWR-AC-USA Spare Secure Access AC Power Cord USA
SA6000-CL-100U Clustering: Allow 100 additional users to be shared from
another SA 6000 SA-ACC-PWR-AC-UK Spare Secure Access AC Power Cord UK
SA6000-CL-250U Clustering: Allow 250 additional users to be shared from SA-ACC-PWR-AC-EUR Spare Secure Access AC Power Cord EUR
another SA 6000 SA-ACC-PWR-AC-JPN Spare Secure Access AC Power Cord JPN
SA6000-CL-500U Clustering: Allow 500 additional users to be shared from SA6000-GBIC-FSX GBIC Transceiver-Fiber SX for SA 6000
another SA 6000 SA6000-GBIC-FLX GBIC Transceiver-Fiber LX for SA 6000
SA6000-CL-1000U Clustering: Allow 1000 additional users to be shared from SA6000-GBIC-COP GBIC Transceiver-Copper for SA 6000
another SA 6000
SA6000-CL-2500U Clustering: Allow 2500 additional users to be shared from
another SA 6000
About Juniper Networks
SA6000-CL-5000U Clustering: Allow 5000 additional users to be shared from
another SA 6000 Juniper Networks, Inc. is the leader in high-performance
SA6000-CL-7500U Clustering: Allow 7500 additional users to be shared from networking. Juniper offers a high-performance network
another SA 6000 infrastructure that creates a responsive and trusted environment
SA6000-CL-10000U Clustering: Allow 10000 additional users to be shared from for accelerating the deployment of services and applications over a
another SA 6000 single network. This fuels high-performance businesses. Additional
SA6000-CL-12500U Clustering: Allow 12500 additional users to be shared from information can be found at www.juniper.net.
another SA 6000
SA6000-CL-15000U Clustering: Allow 15000 additional users to be shared from
another SA 6000

CORPORATE HEADQUARTERS EUROPE, MIDDLE EAST, AFRICA EAST COAST OFFICE ASIA PACIFIC REGIONAL SALES HEADQUARTERS
AND SALES HEADQUARTERS FOR REGIONAL SALES HEADQUARTERS Juniper Networks, Inc. Juniper Networks (Hong Kong) Ltd.
NORTH AND SOUTH AMERICA Juniper Networks (UK) Limited 10 Technology Park Drive 26/F, Cityplaza One
Juniper Networks, Inc. Building 1 Westford, MA 01886-3146 USA 1111 King’s Road
1194 North Mathilda Avenue Aviator Park Phone: 978.589.5800 Taikoo Shing, Hong Kong
Sunnyvale, CA 94089 USA Station Road Fax: 978.589.0800 Phone: 852.2332.3636
Phone: 888.JUNIPER (888.586.4737) Addlestone Fax: 852.2574.7803
or 408.745.2000 Surrey, KT15 2PG, U.K.
Fax: 408.745.2100 Phone: 44.(0).1372.385500
www.juniper.net Fax: 44.(0).1372.385501

Copyright 2008 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper
Networks logo, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc.
in the United States and other countries. JUNOS and JUNOSe are trademarks of Juniper To purchase Juniper Networks solutions, please
Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service
marks are the property of their respective owners. Juniper Networks assumes no responsibility contact your Juniper Networks sales representative
for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
at 1-866-298-6428 or authorized reseller.
100189-006 Feb 2008

You might also like